What Is the Attack Scenario Described in “How to Think About Security”?
This is the first of two parts, so be sure to check out its successor story as well.
In addition to personal identification numbers (PINs), modern systems often add extra information, such as a randomly selected personal question on predetermined topics such as your pet’s name.
Social engineering is an attack against the vulnerability people present within the security ideal. As long as people continue to be involved with computers, people will be a weakness that must be considered and factored into all security decisions. My dream is that one day, a patch will be developed to prevent people from being such a large vulnerability (Deichmann, 1996).
All the books in here are worth owning—though you may not need to acquire all books on identical or related topics from these lists. Together this compilation documents the best-loved and respected titles in the field.
Deichmann, Ute. Biologists Under Hitler. Cambridge: Harvard U. P. 1996.
Egan, M. September 25, 2008. 120 Idiots Give Up Password for £5 M&S Voucher. June 10, 2009
Erickson, Milton. “Two-Level Communication and the Microdynamics of Trance and Suggestion.” The American Journal of Clinical Hypnosis. 1976.
Evans, Richard. The Third Reich in Power. New York: Penguin 2005.